• ​Threat intelligence and contextualization, here’s what you need to consider

    ​Threat intelligence and contextualization, here’s what you need to consider

    Introduction Threat intelligence is a growing domain as it allows organizations to face increasingly sophisticated and persistent threats from cybercriminals, state-sponsored hackers, and other malicious actors there are some aspects to keep into consideration for building competent informed-defense countermeasures. To effectively defend against these threats, organizations need to build contextualization into their threat intelligence platforms.…

  • Five notable cyber attacks in Greece during 2022

    Five notable cyber attacks in Greece during 2022

    2022 threat landscape has been in constant shift, keeping defenders close to cyber trenches given many developments including the RU-UKR war, rise in malware infections and cyber attacks in general and more. Greece managed to remain in EU’s (but the world’s as well) spotlight with some notable cyber attacks. Some of them, are presented below.…

  • “Push” the bad guys back, with Microsoft Authenticator

    “Push” the bad guys back, with Microsoft Authenticator

    Definition A multi-factor authentication (MFA) fatigue attack – also known as MFA Bombing or MFA Spamming – is a social engineering cyberattack strategy where attackers repeatedly push second-factor authentication requests to the target victim’s email, phone, or registered devices. The goal is to coerce the victim into confirming their identity via notification, thus authenticating the…